US10380521B2 - Predicting service for intrusion and alarm systems based on signal activity patterns - Google Patents
Predicting service for intrusion and alarm systems based on signal activity patterns Download PDFInfo
- Publication number
- US10380521B2 US10380521B2 US15/173,775 US201615173775A US10380521B2 US 10380521 B2 US10380521 B2 US 10380521B2 US 201615173775 A US201615173775 A US 201615173775A US 10380521 B2 US10380521 B2 US 10380521B2
- Authority
- US
- United States
- Prior art keywords
- sensor signal
- signal activity
- activity
- historical
- groupings
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0631—Resource planning, allocation, distributing or scheduling for enterprises or organisations
- G06Q10/06312—Adjustment or analysis of established resource schedule, e.g. resource or task levelling, or dynamic rescheduling
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B29/00—Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
- G08B29/02—Monitoring continuously signalling or alarm systems
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B29/00—Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
- G08B29/02—Monitoring continuously signalling or alarm systems
- G08B29/04—Monitoring of the detection circuits
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B31/00—Predictive alarm systems characterised by extrapolation or other computation using updated historic data
Definitions
- This description relates to maintenance of security systems such as intrusion detection and fire monitoring systems.
- Security systems often include a panel that is electrically or wirelessly connected to a variety of sensors. Those sensors typically include motion detectors, cameras, and proximity sensors (used to determine whether a door or window has been opened). Other types of security systems include access control and surveillance systems typically used by commercial businesses.
- Service products such as “MAStermind” (United Technologies, Inc.) help service customer work orders.
- a service dispatch center in a physical location produces a work order upon receipt of a customer complaint.
- the complaint can be regarding a false alarm or an issue with the respect to any of the devices or panels installed in their premises.
- Dispatch center personnel produce the work order request using the service product and schedules a technician to visit the site.
- a work order prediction system includes one or more server computers each comprising a processor device, memory in communication with the processor device, and a storage device, the work order prediction system further configured to retrieve historical sensor signal activity from a database, analyze the historical sensor signal activity to determine counts of signal activity according to defined groupings, retrieve from the database historical service activity, compare corresponding groupings of service record activity against determined counts of historical sensor signal activity to establish threshold values for each of the groupings, and produce a model based on the comparison of the historical sensor signal activity to service activity.
- the groupings are Event ID class groupings.
- the system analyzes historical job details for a customer site and generates the model that predicts future jobs within a limited time frame that can be expected for the customer site.
- a work order prediction system includes one or more server computers each comprising a processor device, memory in communication with the processor device, and a storage device, the work order prediction system further including an analysis engine that retrieves records from a database, which records include sensor signal activity counts for a particular installed system for a particular customer account and compares the sensor signal activity to predetermined thresholds of sensor signal activity and a report generator that generates a report based on the comparison in the analysis engine when sensor signal activity exceeds the determined threshold values.
- the analysis engine analyzes sensor signal activity over a defined period of time.
- the defined period of time is within a range of a prior number of days between 30 days and 120 days measured from the date on which the analysis occurs.
- the analysis engine determines systems that have sensor signal activity over a defined period of time for each event group.
- the analysis engine determines for system whether the system had a service job over a period of time longer than the defined period used for sensor signal activity, and removes those systems that had a service job over the longer period of time from the generated report.
- the analysis engine the generated report is a list of accounts and service job counts over the defined time period.
- aspects also include a computer implemented method for work order prediction and a computer program product tangibly stored on a computer readable hardware storage device including executable instructions for work order prediction.
- the above techniques can be used to provide predictions of what jobs will occur in the near future at a customer site based on historical jobs.
- the techniques provides the dispatcher with details about the predicted job, thus helping a dispatcher to properly plan and prepare to schedule a technician's visit to the customer site.
- FIG. 1 is a schematic diagram of an example security system at a premises.
- FIG. 2 is a block diagram of an intrusion detection panel.
- FIG. 3 is a block diagram showing an example of an access control system.
- FIG. 4 is a block diagram of a prediction system.
- FIG. 5 is a flow diagram of an example flicker algorithm.
- FIG. 6 is a flow diagram of an example recommendation engine.
- FIG. 7 is a block diagram of a computer system.
- FIG. 1 an example application 10 of a security system in particular an intrusion detection system 12 and access control system 14 installed at a premises 16 is shown.
- the premises 16 is commercial premises, but the premises may alternatively be any type of premises or building, e.g., residential, industrial, etc.
- the intrusion detection system 12 includes an intrusion detection panel 18 , and sensors/detectors 19 disbursed throughout the premises 16 .
- the intrusion detection system 12 is in communication with a central monitoring station 20 (also referred to as central monitoring center) via one or more data or communication networks 22 (only one shown), such as the Internet; the phone system or cellular communication system being examples of others.
- the intrusion detection panel 18 receives alarm data signals from plural detectors/sensors (generally referred to as 19 ) that send to the intrusion detection panel 18 information about the status of the monitored premises.
- alarm data or alarm signals refer to signals that as sent from sensors in an alarm system to a monitoring center.
- alarm data or alarm signals can originate from a glass break detector or a contact/proximity switch in an alarm system upon an occurrence of a window being broken or a door opening or a sensor fault condition.
- the detectors 19 may be hard wired or communicate with the intrusion detection panel 18 wirelessly. In general, detectors 19 sense glass breakage, motion, gas leaks, fire, and/or breach of an entry point, and send the sensed information to the intrusion detection panel 18 . Based on the information received from the detectors 19 , the intrusion detection panel 18 determines whether to trigger alarms, e.g., by triggering one or more sirens (not shown) at the premises 16 and/or sending alarm messages to the monitoring station 20 .
- a user may access the intrusion detection panel 18 to control the intrusion detection system, e.g., disarm the intrusion detection system, arm the intrusion detection system, enter predetermined settings, etc.
- the access can be made directly at the premises 16 , e.g., through a keypad 23 connected to the control panel, through a remote device 24 , etc.
- the data or communication network 24 may include any combination of wired and wireless links capable of carrying packet and/or switched traffic, and may span multiple carriers, and a wide geography.
- the data network 22 may simply be the public Internet.
- the data network 22 may include one or more wireless links, and may include a wireless data network, e.g., with tower (not referenced) such as a 2G, 3G, 4G or LTE cellular data network.
- the panel 16 may be in communication with the network 22 by way of Ethernet switch or router (not illustrated).
- the panel 16 may therefore include an Ethernet or similar interface, which may be wired or wireless. Further network components, such as access points, routers, switches, DSL modems, and the like possibly interconnecting the panel 16 with the data network 22 are not illustrated.
- the dispatch center 25 includes personnel stations (not shown), a server(s) system 27 running a service fulfillment program 29 that populates a database (not shown) with historical data and a service alert prediction system (prediction system) 50 .
- the intrusion detection panel 18 includes processor 18 a and memory 18 b , storage 18 c , a key pad 18 d and a network interface card (NIC) 18 e coupled via a bus 18 f .
- the intrusion detection panel 18 also includes one or more interfaces 18 g to receive sensor data from the various sensors 19 . Illustrated for explanatory purpose are detector interfaces 18 g for contact switches, glass break sensors motion detectors, cameras and microphones. Others may be included.
- the access control system 14 During installation of the access control system 14 , the access controllers 14 are configured by a technician according to operational requirements.
- the access control system 14 also includes a gateway 15 a that is coupled to the access controllers 14 a via one or more master controllers 14 c , as shown.
- the access control system 14 also includes a LAN, router, modem, the Internet and cellular or serial communications and a firewall, as illustrated, and a server 15 b that is coupled to the gateway 15 a.
- FIGS. 1-3 are examples of security/intrusion/alarm/access control systems.
- the prediction system 50 includes one or more server computers either dedicated server computers or cloud server computers and database(s) 51 that store sensor signal events or alarm events (discussed below).
- the central monitoring system 20 collects these sensor data on a per site, per customer, per system/model basis and stores this data in database(s) 51 for access by the prediction system 50 .
- the database also stores customer work order records.
- the prediction system 50 accesses such sensor signal data, e.g., sensor activations from sensors at installed systems/devices at customer premises in order to predict potential service issues in advance of customers contacting service providers for service.
- the prediction system 50 sends queries for sensor data stored in the database 51 and analyzes historical sensor data using conditional logic algorithms to build or discover identifying points within the alarm data produced from applicable systems.
- the built or discovered identifying points are referred to herein as “flickers” or “flicker points” and correspond to data elements within a system type (i.e., installed systems/devices at customer premises) that lead the prediction system 50 to generate notifications of predictions of service events.
- a flicker point is a threshold value for each individual grouping, which is derived from a difference between an upper and lower limit of counts of for the particular grouping and is a variance of sensor signal occurrences (signal activity), per grouping.
- the variance between the upper and lower values of assertions is used to determine a threshold for the respective group. That is from the variance a threshold for each group can be defined. When signal activity breaches the threshold for a particular group, then the occurrence is extracted from the data set and presented to a technical support agent to start identifying an issue before a customer requests service.
- the prediction system 50 thus includes an analysis engine 52 that sends queries via query generator 52 a for sensor data stored in the database 51 .
- the analysis engine analyzes this historical sensor data and groups this data into groupings and generates counts of sensor signals across customer accounts over a period of time.
- the prediction system 50 also includes a pattern identifier engine 54 that is used to discover identifying points within the sensor data produced from applicable systems.
- the prediction system 50 analyzes alarm data assertions on a customer account basis to discover identifying points. The analysis seeks to determine existence of large variations in volume of activity between low activity and high activity instances of alarm data assertions. A relatively large variation (or variance) difference between for a customer account can be an indicator of potential need for service.
- the discovered identifying points are referred to herein as “flicker points” and correspond to determined data element thresholds within a system type (i.e., installed systems/devices at customer premises) that will lead the prediction system 50 to generate notifications of predictions of service events.
- the pattern identifier engine 54 identifies and uses the identified “flicker points” by analyzing the grouped historical signal activity data for customer accounts that coincide with service jobs in comparison with those customer accounts that did not coincide with service jobs. From the pattern identifier engine 54 , a model builder engine 56 builds SQL logic based models and produces algorithms to execute against current daily data from sites to produce daily (or periodic) outputs that technical support agents review and may take action on through a user interface generated by user interface engine 60 .
- the prediction system 50 can also include an analysis module 62 that conducts analysis to discover long-term patterns in the queried sensor data.
- the prediction system is configured with a set of thresholds for each of the groupings of alarm data (or alarm signals) and the prediction system 50 queries the database for instances of activity that are higher than the threshold set within the SQL query for each grouping over a defined period of time, e.g., the past 24 hours or previous 30 day period, etc.
- the prediction system constantly sends these queries to query the database.
- the prediction system 50 extracts these “flickers” in sensor signal activity, i.e., alarm data (or alarm signals) in order to obtain actionable data pertaining to specific types of installed equipment at customers' premises and to generate a model that can predict future jobs within a specified time frame, which can be expected for a specific type of installed equipment on a particular customer site.
- Sensor signal activity are signals generated by sensors that are part of intrusion detection, fire, burglar, surveillance and other types of alarm type systems.
- sensor signals can be the actual signals received directly from the sensors or messages generated by the respective intrusion detection, fire, burglar surveillance, etc., systems, which messages are based on actual sensor signals received by the respective systems.
- Examples of a sensor signal is a signal received for instance from contact sensor, e.g., on a door in a customer premises, that generates a signal state that indicates when a door is open or when a door is closed.
- Other examples could be a message generated by an access controller, a signal generated by motion detector, a signal generated by a chemical sensor, or a smoke detector, etc.
- initial processing 70 by the prediction system 50 is shown.
- the prediction system 50 retrieve 72 historical sensor signal activity from database 51 and analyzes 74 the historical sensor signal activity to determine patterns and clusters into Event ID class groupings as discussed below.
- the processing 70 groups the signal activity according to, e.g., customer accounts (or could be according to site) and Event ID class groupings. For example one type of grouping could be grouping according to fire alarm type signals, another type could be burglar alarm signals, etc., and obtains counts of signal activations for each bucket.
- Grouping alarm data or alarm signal assertions by alarm system type e.g., fire alarm type signals, burglar alarm type signals, etc. is used so as to control analysis to estimate a number of assertions of these alarm data or alarm signals lead a service request for each individual bucket (alarm system type) because one type of an alarm system could generate a very high number of assertions before the system actually needs service, whereas, another type of alarm system could generate relatively few assertions to be indicative of the issue or problem on the system that requires service.
- each grouping in general does not have the same threshold level of assertions to be flagged as a potential service issue.
- the processing 70 also retrieves 76 from the database 51 historical service activity.
- the processing 70 compares 78 groupings of service record activity against determined historical sensor signal activity patterns and clusters and establishes 80 threshold values or flicker points for each of the groupings.
- the prediction system 50 produces a model 78 that is based on the comparison of the historical sensor signal activity to service activity using the identified “flicker points” on per customer or per site basis.
- the prediction system 50 retrieves 92 from the database 51 current sensor signal activity on a per customer account (or other) basis.
- the prediction system 50 analyzes 94 the current sensor signal activity to identify an existence of “flicker points” in any of the on per customer or per site basis by determining counts of current sensor signal activity for each of the Event ID class groupings where these counts are for normal activity and signal event activity.
- the processing 90 groups the signal activity according to Event ID class groupings for a customer account (or could be according to a customer site) and determines counts of such activity that occurred over a period of time, e.g., daily using a 30 moving average or other period. These counts of signal activity in each of the Event ID class groupings for a particular customer account (or customer site) are compared 96 to the established thresholds or flicker points, discussed above, which are generated for each Event ID class grouping. Those counts that exceed 100 a threshold for a particular Event ID class groupings by a specified amount are considered as predictive of potential service issues.
- the processing 90 generates 102 a report of these Event ID class groupings that exceeded the threshold for each customer account examined, and can include other information that will be used by a customer service representative to contact a customer and/or schedule a service call or other technical support. If there are more accounts 104 these can be processed, if not the process can exit or can restart and run continuously.
- the prediction system 50 is provided with predefined segmentations of system activity, e.g., Event ID class group, as in Table I below.
- Event ID class group e.g., Event ID class group
- the above groupings can include signal type activity that are not necessarily prefixed in the system.
- the prediction system 50 retrieves signal activity according to the grouping and determines an amount of signal activity for each grouping.
- the prediction system 50 reduces this data to an amount of signal activity that corresponds to a fixed, empirically determined amount.
- the prediction system 50 reduces each signal group to retain a portion of the activity for each segment, e.g., the top 5% or the top 10% or the top 20%, up to about the to 33% of activity for each group within a fixed period of time.
- higher or lower retention percentages could be used, the trade-off being server processing expenditures for diminishing returns on higher percentages, vs. inadequate capture of “flickers” i.e., anomalies, based on sampling of data at lower percentages.
- the prediction system 50 uses the top 10% of activity for each segment, the following exemplary data could be obtained, as signal activity on a per day basis for each of these groupings, as shown in Table 2, below.
- the prediction system 50 generates an output as in Table 2, which is dynamic and is based on the historical signal output variations of the customer account over the fixed period, e.g., day over day (fictitious data used for explanatory purposes only).
- Analyzing historical signal activity for patterns and clustering can use machine learning algorithms but the above described grouping process for various signal types can also be used.
- a mathematical variance i.e., a difference between high and low alarm data (alarm signal) assertion activity is determined for each top level grouping, e.g., customer account.
- Two exemplary variances are shown below for an event class ID “CL” that corresponds to “Close signal” which indicates that the system, i.e., an alarm system has been “armed.”
- Table 3 is an example of a customer account without any service jobs over a defined period of time.
- Table 3 is exemplary of a control account, a profile of what would normally be expected as variation in differences between upper and lower values of instances of a CL event class on a periodic basis here day to day.
- Table 3 shows a lower variance (simple difference) between normal activity and signal events.
- Table 4 is an example of another customer account with service jobs over another defined period of time (five days).
- Table 4 is exemplary of a customer account, a profile of what can be considered as abnormal unexpected variation in differences between upper and lower values of instances of the CL event class on a periodic basis here day to day.
- Table 4 shows a higher variance (simple difference) between normal activity and signal events.
- the prediction system 50 determines “normal” variations in each of the event classes that occur in customer accounts, covering a statistically significant period of time, e.g., 30 days or more. From these tables the prediction system 50 uses these various sensor signal activations from installed devices to predict potential service issues in advance of a customer contacting for repair by derived potential repair recodes from results of querying sensor data using conditional logic built into SQL algorithms that are applied to identified systems. These identifications points are referred to as “Flickers” or data within the system that leads the prediction system 50 signal a technician or service representative to action. The prediction system 50 determines significant correlations between signal activity and propensity of service job requests.
- the prediction system 50 extracts e.g., the prior 30 day signal activity, i.e., alarm data (or alarm signals) for each event group that is tracked by the prediction system 50 for all customer accounts.
- the prediction system 50 summarizes the signal activity, i.e., alarm data (or alarm signals) by customer system (i.e., installed hardware/software/sensor combination that provides a unique burglar, fire, intrusion, etc. alarm system) to obtain the alarm count within each event group for the respective customer system.
- the prediction system 50 identifies those customer systems that have alarm counts of 30 day signal activity, i.e., alarm data (or alarm signals) that exceed threshold counts for each event group.
- the prediction system 50 determines for each customer system whether the customer system had a service job over a period of time longer than the period used for alarm activity, e.g., in last 90 days or 120 days or other time periods for the event group, and if so removes the customer system from a report that the prediction system 50 generates. For example, if a “BA Flicker” is identified and the customer system already had a “BA Remote job” in last 90 days then that can be removed from the daily report. This feature can be included in order to avoid addressing those customer systems that are already being addressed based on the above prediction system 50 .
- a “System and Bypass Flickers Date File” is generated with accounts that exceed threshold.
- This file includes system identification number, Site address, Event Group, Alarm Count, Count of service jobs in last 30 days, Count of Remote Service jobs in last 30 days.
- an additional File a “Flicker Svc. Job Count over Last 30 Days” is generated to list all the flicker accounts and their service job counts over the last 30 days from a snapshot date.
- customer system 1 is identified as Flicker in a Mar. 1, 2015 report, and which will be listed with the count of service jobs between Feb. 1, 2015 and Mar. 1, 2015.
- This file serves as a master file because it has all the systems that are identified as flicker at one instance.
- an additional File “Svc. Jobs Date” can be generated to list the Service Job number and job detail for the flicker accounts. Only Service Jobs produced within the first 30 days of the Flicker Date for the system is included in the file. The Flicker Date is the date when the system exceeded the threshold count for the Event Group. This file is optional.
- the prediction system 50 for each day queries the database to review all event signal activity for each predefined group. When any group breaches the predefined threshold, as determined above, the prediction system 50 produces an output flicker report.
- An exemplary view of a record that can be retrieved from the database is shown below. This view is included to illustrate that for each customer account (field Account) there can be one or more systems (represented by System id in field System) and which system id is associated with various signals (Signal a to Signal n in field Event ID class group) and which have corresponding filtered counts (Signal a count to Signal n count in field Filtered count).
- Event ID class Account System group Filtered count Account i System id Signal a Signal a count Signal b Signal b count * * * * * * Signal n Signal n count Account i + 1 * * * * * * * * * * Account n
- the work order prediction system 50 produces an intuitive user interface that informs dispatch center personnel about why the model predicts a job and also provides details about the job predicted.
- devices and/or systems as well as servers can be of various types of computing devices capable of receiving and processing information to produce output.
- Such devices/systems include one or more processors 122 , memory 124 , interfaces 126 and a network interface 128 coupled via a bus (not referenced).
- storage 130 and a display 132 are also included.
- the system can be a distributed computing system, a rack-mounted server and so forth.
- Server may be a single server or a group of servers that are at a same location or at different locations. Servers can receive information from client device user device via interfaces.
- Interfaces can be any type of interface capable of receiving information over a network, such as an Ethernet interface, a wireless networking interface, a fiber-optic networking interface, a modem, and so forth.
- Server also includes a processor and memory and a bus system including, for example, an information bus and a motherboard, can be used to establish and to control information communication between the components of server.
- Processor may include one or more microprocessors.
- processor may include any appropriate processor and/or logic that is capable of receiving and storing information, and of communicating over a network (not shown).
- Memory can include a hard drive and a random access memory storage device, such as a dynamic random access memory computer readable hardware storage devices and media and other types of non-transitory storage devices.
- Embodiments can be implemented in digital electronic circuitry, or in computer hardware, firmware, software, or in combinations thereof.
- Computer programs can be implemented in a high-level procedural or object oriented programming language, or in assembly or machine language if desired; and in any case, the language can be a compiled or interpreted language.
- Suitable processors include, by way of example, both general and special purpose microprocessors.
- a processor will receive instructions and information from a read-only memory and/or a random access memory.
- a computer will include one or more mass storage devices for storing information files; such devices include magnetic disks, such as internal hard disks and removable disks; magneto-optical disks; and optical disks.
- Storage devices suitable for tangibly embodying computer program instructions and information include all forms of non-volatile memory, including by way of example semiconductor memory devices, such as EPROM, EEPROM, and flash memory devices; magnetic disks such as internal hard disks and removable disks; magneto-optical disks; and CD ROM disks. Any of the foregoing can be supplemented by, or incorporated in, ASICs (application-specific integrated circuits).
- semiconductor memory devices such as EPROM, EEPROM, and flash memory devices
- magnetic disks such as internal hard disks and removable disks
- magneto-optical disks magneto-optical disks
- CD ROM disks compact discs
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Human Resources & Organizations (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Economics (AREA)
- Strategic Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Computer Security & Cryptography (AREA)
- Operations Research (AREA)
- Educational Administration (AREA)
- Development Economics (AREA)
- Game Theory and Decision Science (AREA)
- Marketing (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Emergency Management (AREA)
- Computing Systems (AREA)
- Alarm Systems (AREA)
Abstract
Description
| TABLE 1 | |||
| Event ID class group | name | ||
| BA | burglar alarm | ||
| FA | fire alarm | ||
| TR | trouble signal | ||
| Bypass | Bypass | ||
| CC | critical condition supervisory | ||
| CF | communication failure | ||
| HU | hold up | ||
| LB | low battery | ||
| MA | medical | ||
| SU | supervisory | ||
| TA | tamper | ||
| CM | carbon monoxide | ||
| CL | Close signal | ||
| TABLE 2 | ||||
| Event ID class group | Filtered count | Group name | ||
| BA | 47 | | ||
| FA | ||||
| 18 | fire alarm | |||
| TR | 737 | trouble signal | ||
| Bypass | 326 | Bypass | ||
| CC | 42 | critical condition supervisory | ||
| CF | 247 | communication failure | ||
| HU | 27 | hold up | ||
| LB | 48 | | ||
| MA | ||||
| 19 | Medical | |||
| SU | 34 | Supervisory | ||
| TA | 8 | | ||
| CM | ||||
| 10 | carbon monoxide | |||
| CL | See below | Close signal | ||
| TABLE 3 | |||||
| Date | UCL | LCL | Difference | ||
| Day 1 | 1.17 | 0.88 | 0.29 | ||
| Day 2 | 13.3 | 7.2 | 6.7 | ||
| Day 3 | 4.65 | 0.39 | 4.26 | ||
| Day 4 | 22.1 | 10.36 | 11.45 | ||
| Day 5 | 1.52 | 0.64 | 0.88 | ||
| Day 6 | 94.4 | 7.5 | 86.9 | ||
| TABLE 4 | |||||
| Date | UCL | LCL | Difference | ||
| Day 1 | 295.7 | 98.6 | 199.1 | ||
| Day 2 | 425 | 193 | 232 | ||
| Day 3 | 425 | 197 | 228 | ||
| Day 4 | 430 | 185 | 245 | ||
| Day 5 | 422 | 188 | 234 | ||
| Event ID class | |||||
| Account | System | group | Filtered count | ||
| Account i | System id | Signal a | Signal a count | ||
| Signal b | Signal b count | ||||
| * | * | ||||
| * | * | ||||
| * | * | ||||
| Signal n | Signal n count | ||||
| Account i + 1 | * | * | * | ||
| * | * | * | |||
| * | * | * | |||
| Account n | |||||
Claims (16)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US15/173,775 US10380521B2 (en) | 2016-06-06 | 2016-06-06 | Predicting service for intrusion and alarm systems based on signal activity patterns |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US15/173,775 US10380521B2 (en) | 2016-06-06 | 2016-06-06 | Predicting service for intrusion and alarm systems based on signal activity patterns |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| US20170351787A1 US20170351787A1 (en) | 2017-12-07 |
| US10380521B2 true US10380521B2 (en) | 2019-08-13 |
Family
ID=60482338
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US15/173,775 Active 2037-07-29 US10380521B2 (en) | 2016-06-06 | 2016-06-06 | Predicting service for intrusion and alarm systems based on signal activity patterns |
Country Status (1)
| Country | Link |
|---|---|
| US (1) | US10380521B2 (en) |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10762773B1 (en) * | 2019-08-19 | 2020-09-01 | Ademco Inc. | Systems and methods for building and using a false alarm predicting model to determine whether to alert a user and/or relevant authorities about an alarm signal from a security system |
| CN112163347A (en) * | 2020-10-21 | 2021-01-01 | 中国科学院生态环境研究中心 | Method for evaluating dynamic output characteristics of urban land scale non-point source pollution |
| US11984016B2 (en) | 2021-12-17 | 2024-05-14 | Honeywell International Inc. | Predictive analytics of fire systems to reduce unplanned site visits and efficient maintenance planning |
Families Citing this family (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11151654B2 (en) | 2015-09-30 | 2021-10-19 | Johnson Controls Tyco IP Holdings LLP | System and method for determining risk profile, adjusting insurance premiums and automatically collecting premiums based on sensor data |
| US11436911B2 (en) | 2015-09-30 | 2022-09-06 | Johnson Controls Tyco IP Holdings LLP | Sensor based system and method for premises safety and operational profiling based on drift analysis |
| US10902524B2 (en) | 2015-09-30 | 2021-01-26 | Sensormatic Electronics, LLC | Sensor based system and method for augmenting underwriting of insurance policies |
| US10552914B2 (en) | 2016-05-05 | 2020-02-04 | Sensormatic Electronics, LLC | Method and apparatus for evaluating risk based on sensor monitoring |
| US10810676B2 (en) | 2016-06-06 | 2020-10-20 | Sensormatic Electronics, LLC | Method and apparatus for increasing the density of data surrounding an event |
| FR3068814B1 (en) * | 2017-07-05 | 2020-10-09 | Damien Koblensky | INTRUSION DETECTION METHOD AND DEVICE |
| US11703815B2 (en) | 2018-07-12 | 2023-07-18 | Johnson Controls Tyco IP Holdings LLP | Building control system with predictive maintenance based on time series analysis |
| US20200193802A1 (en) * | 2018-12-17 | 2020-06-18 | Honeywell International Inc. | Systems and methods for detecting a system malfunction in a surveillance system |
| CN110086648A (en) * | 2019-03-13 | 2019-08-02 | 深圳壹账通智能科技有限公司 | Generation method, device, computer equipment and the storage medium of work order |
| US11029820B2 (en) * | 2019-06-26 | 2021-06-08 | Kyocera Document Solutions Inc. | Information processing apparatus, non-transitory computer readable recording medium that records a dashboard application program, and image forming apparatus management system |
| US11796991B2 (en) | 2020-03-26 | 2023-10-24 | International Business Machines Corporation | Context-awareness in preventative maintenance |
| CN113836132B (en) * | 2021-11-29 | 2022-04-08 | 中航金网(北京)电子商务有限公司 | Method and device for checking multi-end report forms |
| US12046120B1 (en) * | 2024-01-31 | 2024-07-23 | The Adt Security Corporation | Alarm scoring based on alarm event data in a storage environment having time-controlled access |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20070209075A1 (en) * | 2006-03-04 | 2007-09-06 | Coffman Thayne R | Enabling network intrusion detection by representing network activity in graphical form utilizing distributed data sensors to detect and transmit activity data |
| US20100262411A1 (en) * | 2006-02-14 | 2010-10-14 | Edsa Micro Corporation | Systems and methods for real-time system monitoring and predictive analysis |
| US9013294B1 (en) * | 2012-01-24 | 2015-04-21 | Alarm.Com Incorporated | Alarm probability |
| US10044857B2 (en) * | 2016-03-30 | 2018-08-07 | Shelter Inc. | System and method for initiating an emergency response |
-
2016
- 2016-06-06 US US15/173,775 patent/US10380521B2/en active Active
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20100262411A1 (en) * | 2006-02-14 | 2010-10-14 | Edsa Micro Corporation | Systems and methods for real-time system monitoring and predictive analysis |
| US20070209075A1 (en) * | 2006-03-04 | 2007-09-06 | Coffman Thayne R | Enabling network intrusion detection by representing network activity in graphical form utilizing distributed data sensors to detect and transmit activity data |
| US9013294B1 (en) * | 2012-01-24 | 2015-04-21 | Alarm.Com Incorporated | Alarm probability |
| US10044857B2 (en) * | 2016-03-30 | 2018-08-07 | Shelter Inc. | System and method for initiating an emergency response |
Cited By (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10762773B1 (en) * | 2019-08-19 | 2020-09-01 | Ademco Inc. | Systems and methods for building and using a false alarm predicting model to determine whether to alert a user and/or relevant authorities about an alarm signal from a security system |
| US11282374B2 (en) | 2019-08-19 | 2022-03-22 | Ademco Inc. | Systems and methods for building and using a false alarm predicting model to determine whether to alert a user and/or relevant authorities about an alarm signal from a security system |
| US11776387B2 (en) | 2019-08-19 | 2023-10-03 | Ademco Inc. | Systems and methods for building and using a false alarm predicting model to determine whether to alert a user and/or relevant authorities about an alarm signal from a security system |
| US12165499B2 (en) | 2019-08-19 | 2024-12-10 | Ademco Inc. | Systems and methods for building and using a false alarm predicting model to determine whether to alert a user and/or relevant authorities about an alarm signal from a security system |
| CN112163347A (en) * | 2020-10-21 | 2021-01-01 | 中国科学院生态环境研究中心 | Method for evaluating dynamic output characteristics of urban land scale non-point source pollution |
| CN112163347B (en) * | 2020-10-21 | 2021-09-07 | 中国科学院生态环境研究中心 | A method for evaluating the dynamic output characteristics of urban plot-scale non-point source pollution |
| US11984016B2 (en) | 2021-12-17 | 2024-05-14 | Honeywell International Inc. | Predictive analytics of fire systems to reduce unplanned site visits and efficient maintenance planning |
| US12530959B2 (en) | 2021-12-17 | 2026-01-20 | Honeywell International Inc. | Predictive analytics of fire systems to reduce unplanned site visits and efficient maintenance planning |
Also Published As
| Publication number | Publication date |
|---|---|
| US20170351787A1 (en) | 2017-12-07 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10380521B2 (en) | Predicting service for intrusion and alarm systems based on signal activity patterns | |
| US10359771B2 (en) | Prediction of false alarms in sensor-based security systems | |
| US10713909B2 (en) | Building access control system with complex event processing | |
| US20210097624A1 (en) | Method and apparatus for increasing the density of data surrounding an event | |
| EP3139359B1 (en) | System and method providing early prediction and forecasting of false alarms by applying statistical inference models | |
| US11068994B2 (en) | Sensor based system and method for augmenting insurance claim filing | |
| US20210217097A1 (en) | Sensor based system and method for augmenting underwriting of insurance policies | |
| US11151654B2 (en) | System and method for determining risk profile, adjusting insurance premiums and automatically collecting premiums based on sensor data | |
| US10354332B2 (en) | Sensor based system and method for drift analysis to predict equipment failure | |
| CA2930540C (en) | Maintenance plan forecast using automation control devices' usage pattern through big data analytics | |
| US11436911B2 (en) | Sensor based system and method for premises safety and operational profiling based on drift analysis | |
| US10425702B2 (en) | Sensor packs that are configured based on business application | |
| US11875278B2 (en) | Door lock fault detection | |
| US20170011312A1 (en) | Predicting Work Orders For Scheduling Service Tasks On Intrusion And Fire Monitoring | |
| US20170091867A1 (en) | Sensor Based System And Method For Determining Allocation Based On Physical Proximity | |
| US7289023B2 (en) | Supervised guard tour tracking systems and methods | |
| US7286048B2 (en) | Supervised guard tour systems and methods | |
| US20210200808A1 (en) | Prison monitoring intelligent control method with comparative analysis function | |
| Sándor et al. | Sensor data validation and abnormal behavior detection in the internet of things | |
| EP2656322B1 (en) | Intrusion detection | |
| JP2008211313A (en) | Surveillance console with failure prediction function | |
| CN116265043A (en) | Predictive analytics for fire systems to reduce unplanned site visits and efficient maintenance planning | |
| WO2021156809A1 (en) | A method and system for device management | |
| Giczi et al. | 7.8. Predictive Maintenance of Security Technology Systems |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: TYCO INTEGRATED SECURITY LLC, FLORIDA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KAPUSCHAT, JASON;TOWNSLEY, TYRENE;JOSEPH, MANORANI;AND OTHERS;SIGNING DATES FROM 20160527 TO 20160531;REEL/FRAME:038825/0592 |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
| STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
| AS | Assignment |
Owner name: JOHNSON CONTROLS TYCO IP HOLDINGS LLP, WISCONSIN Free format text: NUNC PRO TUNC ASSIGNMENT;ASSIGNOR:JOHNSON CONTROLS, INC.;REEL/FRAME:058889/0556 Effective date: 20210806 Owner name: JOHNSON CONTROLS US HOLDINGS LLC, WISCONSIN Free format text: NUNC PRO TUNC ASSIGNMENT;ASSIGNOR:JOHNSON CONTROLS SECURITY SOLUTIONS LLC;REEL/FRAME:058887/0969 Effective date: 20210806 Owner name: JOHNSON CONTROLS, INC., WISCONSIN Free format text: NUNC PRO TUNC ASSIGNMENT;ASSIGNOR:JOHNSON CONTROLS US HOLDINGS LLC;REEL/FRAME:058889/0353 Effective date: 20210806 |
|
| MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |
|
| AS | Assignment |
Owner name: TYCO FIRE & SECURITY GMBH, SWITZERLAND Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:JOHNSON CONTROLS TYCO IP HOLDINGS LLP;REEL/FRAME:068494/0384 Effective date: 20240201 Owner name: TYCO FIRE & SECURITY GMBH, SWITZERLAND Free format text: ASSIGNMENT OF ASSIGNOR'S INTEREST;ASSIGNOR:JOHNSON CONTROLS TYCO IP HOLDINGS LLP;REEL/FRAME:068494/0384 Effective date: 20240201 |